1 |
Hanuscak TL, Szeinbach SL, Seoane-Vazquez E, Reichert BJ, and McCluskey CF. 2009. "Evaluation of causes and frequency of medication errors during information technology downtime." American Journal of Health System Pharmacy, 66(12): 1119-1124.
DOI
|
2 |
HealthcareITnews.com. 2014. Network Glitch Brings Down Epic EMR. healthcareITnews.com: [cited 2015. 5. 18].
|
3 |
HealthIT.gov. 2014. Benefits of EHRs. [cited 2015. 5. 13].
|
4 |
Kahn, S., and Sheshadri, V. 2008. "Medical record privacy and security in a digital environment." IT Professional, 10(2): 46-52.
DOI
|
5 |
ICare.com, 2013. The Enterprise Cloud EHR - Products. White Paper.
|
6 |
Krisnamurthy, Prasant, Chris Clifton, and Matt Bishop. 2010. Introduction of Computer Security. [cited 2016. 3. 11].
|
7 |
Kuo, A. M. H. 2011. "Opportunities and challenges of cloud computing to improve health care services." Journal of medical Internet research, 13(3).
|
8 |
Lee, H. 2013. "The Storage of Electronic Medical Record and Trusted Third Party." Han Yang Law Review, 44: 123-149.
|
9 |
Lohr, H., Sadeghi, A. R., and Winandy, M. 2010. Securing the e-health cloud. Paper presented at the 1st ACM International Health Informatics Symposium.
|
10 |
Maheu, M. 2014. Which Cloud Storage Services are HIPAA Compliant TMHI Blog. [cited 2015. 5. 28].
|
11 |
Mars, M. 2013. "Telemedicine and Advances in Urban and Rural Healthcare Delivery in Africa." Progress in Cardiovascular Diseases, 56(3): 326-335.
DOI
|
12 |
Mell, P., and Grance, T. 2011. The NIST definition of cloud computing. [cited 2016. 3. 2].
|
13 |
McCann, E. 2014. Network glitch brings down Epic EMR. [cited 2016. 3. 10].
|
14 |
Meditouch. 2014. Web-Based EHR - Cloud-Based, SaaS, ASP. HealthFusion.com. [cited 2015. 2. 23].
|
15 |
Myers, J. E. 2012. Data Modeling for Healthcare Systems Integration: Use of the Meta Model. [cited 2015. 6. 28].
|
16 |
Ardagna, C. A., De Capitani di Vimercati, S., Foresti, S., Grandison, T. W., Jajodia, S., and Samarati, P. 2010. "Access control for smarter healthcare using policy spaces." Computers & Security, 29(8): 848-858.
DOI
|
17 |
Botts, N., Thoms, B., Noamani, A., and Horan, T. A. 2010. Cloud computing architectures for the underserved: Public health cyberinfrastructures through a network of healthatms. In System Sciences (HICSS), 43rd Hawaii International Conference.
|
18 |
CareCloud. 2012. How Modern Technology Helped a Multi-Location Orthopedic Group Boost Financial Results and Reporting. White Paper.
|
19 |
Congdon, K. 2014. Is Epic Future Proof?. [cited 2015. 7. 28].
|
20 |
Carpathia. 2013. 5 Benefits of EMR vs. Paper Medical Records.
|
21 |
Cloud Standards Customer Council. 2012. Impact of Cloud Computing on Healthcare. [cited 2016. 3. 10].
|
22 |
Danny Yadron, and Beck, M. 2015. Health Insurer Anthem Didn't Encrypt Data in Theft. [cited 2015. 4. 28].
|
23 |
Curran, K., and Carlin, S. 2013. Cloud Computing Security. In Pervasive and Ubiquitous Technology Innovations for Ambient Intelligence Environments. Hershey: IGI Global.
|
24 |
Ahuja, S. P., Mani, S., and Zambrano, J. 2012. "A survey of the state of cloud computing in healthcare." Network and Communication Technologies, 1(2): 12-19
|
25 |
Apostu, A., Puican, F., Ularu, G., Suciu, G., and Todoran, G. 2013. "Study on advantages and disadvantages of Cloud Computing-the advantages of Telemetry Applications in the Cloud." Recent Advances in Applied Computer Science and Digital Services. New York: Wseas: 118-123.
|
26 |
Department of Health and Human Services. 2009. HITECH Breach Notification Interim Final Rule. [cited 2015. 4. 28].
|
27 |
Egdom, R. V. 2013. 7 Benefits of a Cloud-Based EHR. [cited 2015. 5. 2].
|
28 |
Gunter, T., and Terry, N. 2005. "The Emergence of National Electronic Health Record Architectures in the United States and Australia: Models, Costs, and Questions." Journal of Medical Internet Research, 7(1).
|
29 |
Ferraiolo, D. F., and Kuhn, D. R. 1992. Role-Based Access Controls. Paper presented at the 15th National Computer Security Conference, Baltimore MD.
|
30 |
Gilmer, E. 2013. Privacy and security of patient data in the cloud. IBM Developer Works. [cited 2015. 5. 28].
|
31 |
Miller, S. A., and Blass, G. 2010. "Protection detail: Protecting against breach of electronic protected health information." Journal of Healthcare Information Management, 24(3): 7-8.
|
32 |
Sabahi, F. 2011. Cloud computing security threats and responses. In Communication Software and Networks (ICCSN), 2011 IEEE 3rd International Conference.
|
33 |
Rodrigues, J. J., Torre, I. d. l., Fernandez, G., and Lopez-Coronado, M. (2013). "Analysis of the Security and Privacy Requirements of Cloud-Based Electronic Health Records Systems." Journal of Medical Internet Research, 15(8): 186.
DOI
|
34 |
Rolim, C. O., Koch, F. L., Westphall, C. B., Werner, J., Fracalossi, A., and Salvador, G. S. 2010. "A cloud computing solution for patient's data collection in health care institutions. In eHealth, Telemedicine, and Social Medicine, 2010." ETELEMED'10. Second International Conference: 95-99
|
35 |
Roney, K. 2012. 5 Best Practices for Negotiating, Beginning the Transition to Cloud Servers. [cited 2015. 6. 12].
|
36 |
Williams, F., and Boren, S. A. 2008. "The role of electronic medical record in care delivery in developing countries." International Journal of Information Management, 28(6): 503-507.
DOI
|
37 |
Schweitzer, E. J. 2012. "Reconciliation of the cloud computing model with US federal electronic health record regulations." Journal of the American Medical Informatics Association, 19(2): 161-165.
DOI
|
38 |
Shin, Y, and Park, J. 2005. "Development of Guideline on Electronic Signatures for Electronic Medical Record." Journal of the Korea Contents Association, 5(6): 120-128.
|
39 |
Taylor, K. 2013. ASAE (R) The Center for Association Leadership. [cited 2015. 6. 20].
|